Table of Contents
- 1 Which is more important to the information asset classification scheme that it be comprehensive or that it be mutually exclusive?
- 2 Which two attributes are most important from an information security perspective?
- 3 What is vulnerability and how is it identified?
- 4 What are the 3 major undertakings in risk management?
- 5 What are the 3 pillars of security?
- 6 What are the eight principles of security?
- 7 What are examples of information assets?
- 8 What are the 4 main types of vulnerability?
- 9 Which is more important to the information asset classification scheme?
- 10 What are two things must be achieved to secure information assets successfully?
- 11 Which is information attribute is often of great value for networking equipment?
Which is more important to the information asset classification scheme that it be comprehensive or that it be mutually exclusive?
14. Which is more important to the information asset classification scheme: that it be comprehensive or that it be mutually exclusive? Answer: A comprehensive information asset classification scheme is more desirable because it implies that all assets will be included, even if they appear in more than one location.
Which two attributes are most important from an information security perspective?
Confidentiality and authentication may be most important from an information security perspective. Together, these two concepts ensure that our nation’s private information is contained and that anyone who wants access to it must prove who they are and why they need access.
Why is identification of risks through a listing of assets?
Why is identification of risks, through a listing of assets and their vulnerabilities, so important to the risk management process? It is important so management can know the value of the company asset and what losses will be incurred if it is compromised.
What is vulnerability and how is it identified?
A vulnerability is a flaw that could lead to the compromise of the confidentiality, integrity or availability of an information system. Vulnerability identification involves the process of discovering vulnerabilities and documenting these into an inventory within the target environment.
What are the 3 major undertakings in risk management?
Risk Management involves three major undertakings (Risk Identification, Risk Assessment and Risk Control).
What are the five risk control strategies?
The basic methods for risk management—avoidance, retention, sharing, transferring, and loss prevention and reduction—can apply to all facets of an individual’s life and can pay off in the long run. Here’s a look at these five methods and how they can apply to the management of health risks.
What are the 3 pillars of security?
The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
What are the eight principles of security?
The eight design principles are:
- Principle of Least Privilege.
- Principle of Fail-Safe Defaults.
- Principle of Economy of Mechanism.
- Principle of Complete Mediation.
- Principle of Open Design.
- Principle of Separation of Privilege.
- Principle of Least Common Mechanism.
- Principle of Psychological Acceptability.
How do you identify assets?
identify a range of physical assets, including equipment, tools, racks, and machines. These asset tags include serial numbers that serve as unique identification numbers. Asset tags may be made of foil, aluminum, premium polyester, or vinyl. You can use barcode label asset tags to identify your assets.
What are examples of information assets?
An information assets can have many different forms: it can be a paper document, a digital document, a database, a password or encryption key or any other digital file. Each asset is stored on some carrier like paper, a USB stick, hard drive, laptop, server, cloud or backup tape.
What are the 4 main types of vulnerability?
The different types of vulnerability In the table below four different types of vulnerability have been identified, Human-social, Physical, Economic and Environmental and their associated direct and indirect losses.
What is the most common vulnerability?
OWASP Top 10 Vulnerabilities
- Injection. Injection occurs when an attacker exploits insecure code to insert (or inject) their own code into a program.
- Broken Authentication.
- Sensitive Data Exposure.
- XML External Entities.
- Broken Access Control.
- Security Misconfiguration.
- Cross-Site Scripting.
- Insecure Deserialization.
Which is more important to the information asset classification scheme?
Answer: It is useful because the documents can be updated when required and can be retrieved quickly if systems are unavailable. 14. Which is more important to the information asset classification scheme: that it be comprehensive or that it be mutually exclusive?
What are two things must be achieved to secure information assets successfully?
4. According to Sun Tzu, what two things must be achieved to secure information assets successfully? Answer: To reduce risk in an organization, the organization must know itself (including its assets and processes used to protect them) and know its enemy (the nature of the threats it faces).
Which is the most frequently encountered category in ISA management?
The most frequently encountered category is often “human error or failure” because it is often the hardest to control, as access must be given to trusted insiders as a requirement for them to perform their assigned duties. 18. What are vulnerabilities? Answer: Vulnerabilities are opportunities for a threat to become a loss.
Which is information attribute is often of great value for networking equipment?
12. Which information attribute is often of great value for networking equipment when the Dynamic Host Configuration Protocol (DHCP) is not used? Answer: If the IP address can be tied to specific assets, it can be very useful for asset tracking. 13. When you document procedures, why is it useful to know where the electronic versions are stored?
https://www.youtube.com/watch?v=ClWw1znEUqI